Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
— Sharing of the frequency spectrum between licensed primary users and unlicensed secondary users (SUs) requires reliable detection of spectrum occupancy by the SUs. Due to fadin...
Frank E. Visser, Gerard J. M. Janssen, Przemyslaw ...
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Vision-based systems for remote surveillance usually involve change detection algorithms for intruders, obstacles or irregularities detection. In particular, there is a potentiall...
Plagiarism in universities has always been a difficult problem to overcome. Various tools have been developed over the past few years to help teachers detect plagiarism in students...